Chapter 36 Encryption Algorithms

TT Forum.

The top Chinese Internet programmer forum, the world's leading computer technology forum.

TT Forum has the following sections:

[Hacker Jianghu],This is an irrigation area.,There are about more than 100 posts a day.,Most of them are some dead houses who are obsessed with technology chatting and fart.,Occasionally talk about some recent news.,It's a leisure area for the forum.。

The second section is the [Technology Discussion Forum], which is divided into several small discussion areas, including [Network Security], [Programming Exchange], [Artificial Intelligence], [Kill-free Technology] and [Hardware Design] and so on.

The level of this discussion forum is much higher than that of ordinary computer hacker forums, and almost every post in it involves the most cutting-edge technology at the moment, and there are a lot of useful information.

That's one of the reasons why TT forums attract top programmers.

The third section is the [Technical Information Area], which is full of papers written by many altar friends, according to the alliance elders will charge different prices for the rating of each paper, the lowest one hundred TT coins can be browsed, and the highest one needs five hundred TT coins.

If someone buys to read, TT coins are generally split between the forum and the author.

Yang Lin contributed three papers worth 200 TT coins in it, but the money was often not spent quickly.

The last section is [Black Market Replacement], this section is very interesting, you can release different tasks to these top hackers through TT coins, there are technical questions, data decryption, program writing, etc., as long as someone completes the tasks in it, you can get the TT coin reward of the task initiator.

Yang Lin rarely posts in the [Black Market Replacement] section, and only occasionally takes on a few small tasks to earn some pocket money.

Since the last time the WIN7 system entered his brain, Yang Lin has not logged on to the forum for a while. I logged in today, just to check if there is any useful information for him to develop an Android app.

However, after entering the forum, Yang Lin soon found that something seemed wrong with today's TT forum.

In the past, there were only more than 100 posts in the [Hacker Jianghu] section a day, but today it has reached more than 500 before the evening, and the posts in other sections have also turned a lot more than usual.

Yang Lin is a little strange, could it be that something big has happened in the hacker circle?

Yang Lin took a sip of green tea, clicked on the [Hacker Jianghu] section, and soon, a post with refinement and red came into his eyes.

[AG82 "Red Blood Cells" said that no one in the world is afraid to crack the PC version of "Resident Evil: Revelations" data package]

Yang Lin's pupils shrank suddenly.

Erythrocyte?

Resident Evil: Revelations on PC?

He hurriedly clicked on the post, and the main post was a screenshot of a Japanese text with a translation.

This article was probably published on a hacker forum in Japan, and then carried back to China by TT netizens.

The article tells the PC version of "Resident Evil: Apocalypse" that has recently caused waves in the game industry, and said that the AG82 team received a request from Capcom, with the help of all members, with the help of mainframe computers, spent a lot of time and energy, and still has no way to do anything about the game's data package, and even its encryption algorithm has not been fully understood, at the end of the article, [Red Blood Cell] appeals, hoping that the world's hacker masters will join in and be able to crack the game data package!

"! Nima! What's the situation? ”

The tea in Yang Lin's mouth almost squirted out, knowing that something was wrong!

Someone actually wants to crack his game, but if he can't crack it, the world is clamoring for its encryption algorithm?

He wasn't worried about the algorithm being cracked by someone else.

You must know that this is a new algorithm that he researched on the basis of the DES algorithm and the dynamic encryption algorithm through the binary matrix code, which can be said to have the advantages of both the DES algorithm and the infinite dynamic encryption algorithm

The DES algorithm has extremely high security, and so far, no more effective method has been found except for the exhaustive search method to attack the DES algorithm. The exhaustive space for a 56-bit key is 256, which theoretically means that if a computer detects a million keys per second, it would take nearly 2,285 years to search for all the keys.

Of course, this does not mean that DES is unhackable. With the development of hardware technology and Intemet, it only takes a few hours for the state machine and those mega-corporations to crack the DES algorithm using specially designed hardware parallel processing.

However, Yang Lin added dynamic encryption methods on the basis of the DES algorithm, and the 56-bit long key changes almost all the time, so that the difficulty of cracking increases geometrically.

At least with current computer technology, there is little chance of being cracked.

Even if he wants to crack this algorithm, he can only load the data packet into the brain and then directly convert it into a matrix language to crack it successfully.

When he first thought of this new algorithm, he didn't think much about it at all, and directly applied it to the PC version of "Resident Evil: Revelations".

He never expected that Capcom would find a cracking team to crack this game, and what made him even more speechless was that if he couldn't crack it, the other party would directly make it public.

This has a huge impact on him!

With the status of [red blood cells] in the hacker world, after his publicity, this new algorithm is likely to attract the attention of hackers and state apparatus all over the world.

After all, an algorithm that can guarantee the absolute security of information can be regarded as a strategic resource for any country, especially in the military field, and its role is almost irreplaceable.

Once cryptography experts in various countries prove the importance of this algorithm, then no matter which country, I am afraid that they will dig deep to find out the author of this algorithm.

And the PC version of "Resident Evil: Apocalypse" is the biggest clue.

Thinking about how he had released the PC version of "Resident Evil: Revelations" so generously before, Yang Lin couldn't help but sweat coldly, and secretly scolded himself for being too careless.

Fortunately, I stopped downloading this game yesterday and carried out a series of finishing actions, otherwise once the state machine reacts, I am afraid that my freedom for the rest of my life will be in question.

Yang Lin pulled down the post, and there were already many well-known TT netizens who left messages below.

First floor [Hongxiu Boxing]: Really fake? Is the data package of a copycat game so exaggerated?

2nd Floor [TNNDTS]: Hey, it's the first time I've heard of this, I'll take a look~

Third Floor [Night Chapter]: This is too mysterious, waiting and seeing.

……

Most of the first dozen or so were questioning or waiting and seeing the content of this post, and it wasn't until a forum elite named [Felix] spoke that this post became completely lively.

[Felix] is the director of a large domestic game company, immersed in the Internet industry for many years, he wrote in his reply: "I just contacted a friend of Capcom, basically can confirm the authenticity of this post, you can try, if any friend can crack this data packet, on behalf of the company, I am willing to invite you to join with an annual salary of 2 million!" ”

As soon as [Felix]'s message came out, it immediately aroused the interest of many masters.

Everyone left messages below expressing their willingness to give it a try.

However, nearly fifteen hours have passed since this post was issued, and not only has no one been able to crack the game's data package, but many people don't even have a clue how to crack it.

Yang Lin exited this thread, and then walked around the forum a few times, and found that whether it was in [Hacker Jianghu] or in other sections, many people were already discussing the encryption algorithm of this data packet.

Yang Lin shook his head with a wry smile, knowing in his heart that I am afraid that for a long time after today, it will be difficult for his company's products to use this new algorithm.

At this moment, the chat box on the TT forum suddenly lit up, and the page showed that a friend had sent him a message.